General

  • Target

    1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574

  • Size

    7.2MB

  • Sample

    210810-rak3apmmw2

  • MD5

    9cd27149543000c7f93e9943ecb9847e

  • SHA1

    44ac42e9cfed91c80fb92600d522b674edbd3253

  • SHA256

    1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574

  • SHA512

    f17dfb4095d094bfd8cc01e639bbf518798b700ebf2959cc8fe224beeca7e458a758c22d11fe0c45daff8cbe3ce1dcabb67f2969179ad27af99b2cef6c4549ec

Malware Config

Targets

    • Target

      1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574

    • Size

      7.2MB

    • MD5

      9cd27149543000c7f93e9943ecb9847e

    • SHA1

      44ac42e9cfed91c80fb92600d522b674edbd3253

    • SHA256

      1be0fa9406c29a7abda87efbc7af4a6b1537d03cd5bdfc9f7c1e83d7deeaf574

    • SHA512

      f17dfb4095d094bfd8cc01e639bbf518798b700ebf2959cc8fe224beeca7e458a758c22d11fe0c45daff8cbe3ce1dcabb67f2969179ad27af99b2cef6c4549ec

    • Klingon

      Klingon is a remote access trojan written in Golang with various capabilities.

    • Klingon RAT Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks